Cybersecurity
Voting Experts: Why the Heck Are People Still Voting Online?
At least 100,000 online ballots—including the votes of overseas military personnel—were cast in 2016.
Cybersecurity
GAO: Vulnerabilities Plague 'Entire Generation' of U.S. Weapons Systems
Defense officials were often unaware of vulnerabilities and didn’t notice they were being exploited.
Cybersecurity
The Chinese Motherboard Hack Is a Crisis, Even If It Didn’t Really Happen
Apple, Amazon, and Super Micro have all denied the veracity of a report on Chinese hardware hacking. No matter the outcome, the results could inflame an already raw trade relationship for high tech between the U.S. and China.
Cybersecurity
Survey: Most Feds Could Steal Government Data If They Wanted To
But most have no desire.
Cybersecurity
DHS Research Wing Remains Vulnerable to Insider Threats
A six-month review found employees and contractors could undermine mission-critical systems.
Cybersecurity
GAO: DOD weapons systems easy to hack
The Department of Defense is playing catch up when it comes to securing weapons systems from cyberattacks, according to a new report by the Government Accountability Office.
Cybersecurity
Half of Government Domains Set to Make Email Security Deadline
It’s been one year since DHS mandated agencies adopt the anti-spoofing email security tool.
Cybersecurity
Agencies' DMARC progress deserves praise
Now it's time for federal contractors to follow suit.
Cybersecurity
DHS gets in the weeds on cyber threats to agriculture
A new report from DHS surveys a new crop of threats facing the burgeoning field of precision agriculture.
Cybersecurity
In California, It’s Going to Be Illegal to Make Routers With Weak Passwords
The range of devices that the law covers is incredibly broad.
Cybersecurity
Lessons learned from DOD's bug bounty programs
The Marines Corps Cyber Command just completed a month-long bug bounty program, but there's much more work to do.
Cybersecurity
Trump’s Looser Reins on Offensive Cyber Get Positive Reviews from Army
Trump rescinded Obama-era rules that required White House sign off for most offensive cyber operations.
Cybersecurity
New Tool Fights Fake News by Exposing the Websites That Create It
MIT and Qatari researchers say it’s easier to expose a liar than debunk each of his lies
Cybersecurity
Report: China Used Tiny Chips to Infiltrate the U.S. Supply Chain
A Chinese company targeted data centers of some of the largest commercial companies, according to a report.
Cybersecurity
U.S. indicts Russian hackers in global conspiracy
New indictments of Russian hackers reveals a global effort to sow disinformation, according to U.S. officials.
Cybersecurity
IoT poses special cyber risks
Internet-connected devices pose special risks for federal agencies, and the National Institute of Standards and Technology is developing guidance to meet the need.
Cybersecurity
Senate Agrees Federal Cybersecurity Office Should Have Name To Match
A long-stalled bill to include “cybersecurity” in the name of the government’s central cybersecurity office is now moving forward.
Cybersecurity
Report: China infiltrated supply chain of top server supplier
An explosive story from Bloomberg Businessweek alleges that Chinese government agents planted tiny chips in servers widely used in government and industry – but so far firms are denying reports.
Cybersecurity
Senate OKs creation of new DHS cyber agency
The long-sought promotion of the National Protection and Programs Directorate was approved by the Senate on Oct. 3.
Cybersecurity